Inheritance promotes code ___________.
(a) reinvention
(b) reuse
(c) repeats
(d) all of the above
(b) reuse
Computer Science & Information Technology
You might also like to view...
Third-generation, stateful inspection firewalls monitor network connections between internal and external systems using ____.
A. rules sets B. stateless protocols C. state tables D. SQL databases
Computer Science & Information Technology
Views do not make the SQL efficient, just secure.
Answer the following statement true (T) or false (F)
Computer Science & Information Technology